Lines Matching defs:crypt_stat
54 * @crypt_stat: Pointer to crypt_stat struct for the current inode
58 * Uses the allocated crypto context that crypt_stat references to
62 struct ecryptfs_crypt_stat *crypt_stat,
65 int rc = crypto_shash_tfm_digest(crypt_stat->hash_tfm, src, len, dst);
102 * @crypt_stat: Pointer to crypt_stat struct for the current inode
110 int ecryptfs_derive_iv(char *iv, struct ecryptfs_crypt_stat *crypt_stat,
119 ecryptfs_dump_hex(crypt_stat->root_iv, crypt_stat->iv_bytes);
125 memcpy(src, crypt_stat->root_iv, crypt_stat->iv_bytes);
126 memset((src + crypt_stat->iv_bytes), 0, 16);
127 snprintf((src + crypt_stat->iv_bytes), 16, "%lld", offset);
130 ecryptfs_dump_hex(src, (crypt_stat->iv_bytes + 16));
132 rc = ecryptfs_calculate_md5(dst, crypt_stat, src,
133 (crypt_stat->iv_bytes + 16));
139 memcpy(iv, dst, crypt_stat->iv_bytes);
142 ecryptfs_dump_hex(iv, crypt_stat->iv_bytes);
150 * @crypt_stat: Pointer to the crypt_stat struct to initialize.
152 * Initialize the crypt_stat structure.
154 int ecryptfs_init_crypt_stat(struct ecryptfs_crypt_stat *crypt_stat)
168 memset((void *)crypt_stat, 0, sizeof(struct ecryptfs_crypt_stat));
169 INIT_LIST_HEAD(&crypt_stat->keysig_list);
170 mutex_init(&crypt_stat->keysig_list_mutex);
171 mutex_init(&crypt_stat->cs_mutex);
172 mutex_init(&crypt_stat->cs_tfm_mutex);
173 crypt_stat->hash_tfm = tfm;
174 crypt_stat->flags |= ECRYPTFS_STRUCT_INITIALIZED;
181 * @crypt_stat: Pointer to the crypt_stat struct to initialize.
183 * Releases all memory associated with a crypt_stat struct.
185 void ecryptfs_destroy_crypt_stat(struct ecryptfs_crypt_stat *crypt_stat)
189 crypto_free_skcipher(crypt_stat->tfm);
190 crypto_free_shash(crypt_stat->hash_tfm);
192 &crypt_stat->keysig_list, crypt_stat_list) {
196 memset(crypt_stat, 0, sizeof(struct ecryptfs_crypt_stat));
265 * @crypt_stat: Pointer to the crypt_stat struct to initialize.
274 static int crypt_scatterlist(struct ecryptfs_crypt_stat *crypt_stat,
285 crypt_stat->key_size);
286 ecryptfs_dump_hex(crypt_stat->key,
287 crypt_stat->key_size);
290 mutex_lock(&crypt_stat->cs_tfm_mutex);
291 req = skcipher_request_alloc(crypt_stat->tfm, GFP_NOFS);
293 mutex_unlock(&crypt_stat->cs_tfm_mutex);
302 if (!(crypt_stat->flags & ECRYPTFS_KEY_SET)) {
303 rc = crypto_skcipher_setkey(crypt_stat->tfm, crypt_stat->key,
304 crypt_stat->key_size);
309 mutex_unlock(&crypt_stat->cs_tfm_mutex);
313 crypt_stat->flags |= ECRYPTFS_KEY_SET;
315 mutex_unlock(&crypt_stat->cs_tfm_mutex);
330 static loff_t lower_offset_for_page(struct ecryptfs_crypt_stat *crypt_stat,
333 return ecryptfs_lower_header_size(crypt_stat) +
339 * @crypt_stat: crypt_stat containing cryptographic context for the
350 static int crypt_extent(struct ecryptfs_crypt_stat *crypt_stat,
359 size_t extent_size = crypt_stat->extent_size;
363 rc = ecryptfs_derive_iv(extent_iv, crypt_stat,
380 rc = crypt_scatterlist(crypt_stat, &dst_sg, &src_sg, extent_size,
412 struct ecryptfs_crypt_stat *crypt_stat;
420 crypt_stat =
421 &(ecryptfs_inode_to_private(ecryptfs_inode)->crypt_stat);
422 BUG_ON(!(crypt_stat->flags & ECRYPTFS_ENCRYPTED));
432 extent_offset < (PAGE_SIZE / crypt_stat->extent_size);
434 rc = crypt_extent(crypt_stat, enc_extent_page, page,
443 lower_offset = lower_offset_for_page(crypt_stat, page);
481 struct ecryptfs_crypt_stat *crypt_stat;
488 crypt_stat =
489 &(ecryptfs_inode_to_private(ecryptfs_inode)->crypt_stat);
490 BUG_ON(!(crypt_stat->flags & ECRYPTFS_ENCRYPTED));
492 lower_offset = lower_offset_for_page(crypt_stat, page);
505 extent_offset < (PAGE_SIZE / crypt_stat->extent_size);
507 rc = crypt_extent(crypt_stat, page, page,
523 * @crypt_stat: Uninitialized crypt stats structure
530 int ecryptfs_init_crypt_ctx(struct ecryptfs_crypt_stat *crypt_stat)
538 crypt_stat->cipher, (int)strlen(crypt_stat->cipher),
539 crypt_stat->key_size << 3);
540 mutex_lock(&crypt_stat->cs_tfm_mutex);
541 if (crypt_stat->tfm) {
546 crypt_stat->cipher, "cbc");
549 crypt_stat->tfm = crypto_alloc_skcipher(full_alg_name, 0, 0);
550 if (IS_ERR(crypt_stat->tfm)) {
551 rc = PTR_ERR(crypt_stat->tfm);
552 crypt_stat->tfm = NULL;
558 crypto_skcipher_set_flags(crypt_stat->tfm,
564 mutex_unlock(&crypt_stat->cs_tfm_mutex);
568 static void set_extent_mask_and_shift(struct ecryptfs_crypt_stat *crypt_stat)
572 crypt_stat->extent_mask = 0xFFFFFFFF;
573 crypt_stat->extent_shift = 0;
574 if (crypt_stat->extent_size == 0)
576 extent_size_tmp = crypt_stat->extent_size;
579 crypt_stat->extent_mask <<= 1;
580 crypt_stat->extent_shift++;
584 void ecryptfs_set_default_sizes(struct ecryptfs_crypt_stat *crypt_stat)
588 crypt_stat->extent_size = ECRYPTFS_DEFAULT_EXTENT_SIZE;
589 set_extent_mask_and_shift(crypt_stat);
590 crypt_stat->iv_bytes = ECRYPTFS_DEFAULT_IV_BYTES;
591 if (crypt_stat->flags & ECRYPTFS_METADATA_IN_XATTR)
592 crypt_stat->metadata_size = ECRYPTFS_MINIMUM_HEADER_EXTENT_SIZE;
595 crypt_stat->metadata_size =
598 crypt_stat->metadata_size = PAGE_SIZE;
607 int ecryptfs_compute_root_iv(struct ecryptfs_crypt_stat *crypt_stat)
612 BUG_ON(crypt_stat->iv_bytes > MD5_DIGEST_SIZE);
613 BUG_ON(crypt_stat->iv_bytes <= 0);
614 if (!(crypt_stat->flags & ECRYPTFS_KEY_VALID)) {
620 rc = ecryptfs_calculate_md5(dst, crypt_stat, crypt_stat->key,
621 crypt_stat->key_size);
627 memcpy(crypt_stat->root_iv, dst, crypt_stat->iv_bytes);
630 memset(crypt_stat->root_iv, 0, crypt_stat->iv_bytes);
631 crypt_stat->flags |= ECRYPTFS_SECURITY_WARNING;
636 static void ecryptfs_generate_new_key(struct ecryptfs_crypt_stat *crypt_stat)
638 get_random_bytes(crypt_stat->key, crypt_stat->key_size);
639 crypt_stat->flags |= ECRYPTFS_KEY_VALID;
640 ecryptfs_compute_root_iv(crypt_stat);
643 ecryptfs_dump_hex(crypt_stat->key,
644 crypt_stat->key_size);
650 * @crypt_stat: The inode's cryptographic context
657 struct ecryptfs_crypt_stat *crypt_stat,
661 crypt_stat->flags |= ECRYPTFS_METADATA_IN_XATTR;
663 crypt_stat->flags |= ECRYPTFS_VIEW_AS_ENCRYPTED;
665 crypt_stat->flags |= ECRYPTFS_ENCRYPT_FILENAMES;
668 crypt_stat->flags |= ECRYPTFS_ENCFN_USE_MOUNT_FNEK;
671 crypt_stat->flags |= ECRYPTFS_ENCFN_USE_FEK;
676 struct ecryptfs_crypt_stat *crypt_stat,
682 mutex_lock(&crypt_stat->keysig_list_mutex);
690 rc = ecryptfs_add_keysig(crypt_stat, global_auth_tok->sig);
699 mutex_unlock(&crypt_stat->keysig_list_mutex);
705 * @crypt_stat: The inode's cryptographic context
711 struct ecryptfs_crypt_stat *crypt_stat,
714 ecryptfs_copy_mount_wide_flags_to_inode_flags(crypt_stat,
716 ecryptfs_set_default_sizes(crypt_stat);
717 strcpy(crypt_stat->cipher, ECRYPTFS_DEFAULT_CIPHER);
718 crypt_stat->key_size = ECRYPTFS_DEFAULT_KEY_BYTES;
719 crypt_stat->flags &= ~(ECRYPTFS_KEY_VALID);
720 crypt_stat->file_version = ECRYPTFS_FILE_VERSION;
721 crypt_stat->mount_crypt_stat = mount_crypt_stat;
736 * via the set of signatures in the crypt_stat struct. Later, when
745 struct ecryptfs_crypt_stat *crypt_stat =
746 &ecryptfs_inode_to_private(ecryptfs_inode)->crypt_stat;
753 ecryptfs_set_default_crypt_stat_vals(crypt_stat, mount_crypt_stat);
754 crypt_stat->flags |= (ECRYPTFS_ENCRYPTED | ECRYPTFS_KEY_VALID);
755 ecryptfs_copy_mount_wide_flags_to_inode_flags(crypt_stat,
757 rc = ecryptfs_copy_mount_wide_sigs_to_inode_sigs(crypt_stat,
766 memcpy(crypt_stat->cipher,
769 crypt_stat->cipher[cipher_name_len] = '\0';
770 crypt_stat->key_size =
772 ecryptfs_generate_new_key(crypt_stat);
773 rc = ecryptfs_init_crypt_ctx(crypt_stat);
777 crypt_stat->cipher, rc);
819 * @crypt_stat: The cryptographic context
823 static void ecryptfs_process_flags(struct ecryptfs_crypt_stat *crypt_stat,
832 crypt_stat->flags |= ecryptfs_flag_map[i].local_flag;
834 crypt_stat->flags &= ~(ecryptfs_flag_map[i].local_flag);
836 crypt_stat->file_version = ((flags >> 24) & 0xFF);
860 struct ecryptfs_crypt_stat *crypt_stat,
867 if (crypt_stat->flags & ecryptfs_flag_map[i].local_flag)
870 flags |= ((((u8)crypt_stat->file_version) << 24) & 0xFF000000);
974 struct ecryptfs_crypt_stat *crypt_stat,
980 header_extent_size = (u32)crypt_stat->extent_size;
982 (u16)(crypt_stat->metadata_size / crypt_stat->extent_size);
996 * @crypt_stat: The cryptographic context
1024 struct ecryptfs_crypt_stat *crypt_stat,
1034 ecryptfs_write_crypt_stat_flags((page_virt + offset), crypt_stat,
1037 ecryptfs_write_header_metadata((page_virt + offset), crypt_stat,
1040 rc = ecryptfs_generate_key_packet_set((page_virt + offset), crypt_stat,
1120 struct ecryptfs_crypt_stat *crypt_stat =
1121 &ecryptfs_inode_to_private(ecryptfs_inode)->crypt_stat;
1128 if (likely(crypt_stat->flags & ECRYPTFS_ENCRYPTED)) {
1129 if (!(crypt_stat->flags & ECRYPTFS_KEY_VALID)) {
1140 virt_len = crypt_stat->metadata_size;
1150 rc = ecryptfs_write_headers_virt(virt, virt_len, &size, crypt_stat,
1157 if (crypt_stat->flags & ECRYPTFS_METADATA_IN_XATTR)
1176 static int parse_header_metadata(struct ecryptfs_crypt_stat *crypt_stat,
1187 crypt_stat->metadata_size = (((size_t)num_header_extents_at_front
1191 && (crypt_stat->metadata_size
1195 crypt_stat->metadata_size);
1202 * @crypt_stat: The cryptographic context
1208 static void set_default_header_data(struct ecryptfs_crypt_stat *crypt_stat)
1210 crypt_stat->metadata_size = ECRYPTFS_MINIMUM_HEADER_EXTENT_SIZE;
1216 struct ecryptfs_crypt_stat *crypt_stat;
1219 crypt_stat = &ecryptfs_inode_to_private(inode)->crypt_stat;
1224 if (crypt_stat->flags & ECRYPTFS_METADATA_IN_XATTR)
1225 file_size += crypt_stat->metadata_size;
1229 crypt_stat->flags |= ECRYPTFS_I_SIZE_INITIALIZED;
1235 * @crypt_stat: The cryptographic context
1245 struct ecryptfs_crypt_stat *crypt_stat,
1253 ecryptfs_set_default_sizes(crypt_stat);
1254 crypt_stat->mount_crypt_stat = &ecryptfs_superblock_to_private(
1260 if (!(crypt_stat->flags & ECRYPTFS_I_SIZE_INITIALIZED))
1263 ecryptfs_process_flags(crypt_stat, (page_virt + offset), &bytes_read);
1264 if (crypt_stat->file_version > ECRYPTFS_SUPPORTED_FILE_VERSION) {
1268 crypt_stat->file_version,
1274 if (crypt_stat->file_version >= 1) {
1275 rc = parse_header_metadata(crypt_stat, (page_virt + offset),
1283 set_default_header_data(crypt_stat);
1284 rc = ecryptfs_parse_packet_set(crypt_stat, (page_virt + offset),
1361 struct ecryptfs_crypt_stat *crypt_stat =
1362 &ecryptfs_inode_to_private(ecryptfs_inode)->crypt_stat;
1367 ecryptfs_copy_mount_wide_flags_to_inode_flags(crypt_stat,
1375 rc = ecryptfs_read_lower(page_virt, 0, crypt_stat->extent_size,
1378 rc = ecryptfs_read_headers_virt(page_virt, crypt_stat,
1392 rc = ecryptfs_read_headers_virt(page_virt, crypt_stat,
1401 if (crypt_stat->mount_crypt_stat->flags
1403 crypt_stat->flags |= ECRYPTFS_METADATA_IN_XATTR;
1852 * @mount_crypt_stat: The crypt_stat struct associated with the file name to encode
1860 * pointed to by crypt_stat->tfm.